Sciweavers

2874 search results - page 531 / 575
» Intrusion Detection: Systems and Models
Sort
View
WWW
2006
ACM
16 years 14 days ago
Logical structure based semantic relationship extraction from semi-structured documents
Addressed in this paper is the issue of semantic relationship extraction from semi-structured documents. Many research efforts have been made so far on the semantic information ex...
Kuo Zhang, Gang Wu, Juan-Zi Li
CHI
2009
ACM
16 years 11 days ago
Conversation clusters: grouping conversation topics through human-computer dialog
Conversation Clusters explores the use of visualization to highlight salient moments of live conversation while archiving a meeting. Cheaper storage and easy access to recording d...
Tony Bergstrom, Karrie Karahalios
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 10 days ago
Name-ethnicity classification from open sources
The problem of ethnicity identification from names has a variety of important applications, including biomedical research, demographic studies, and marketing. Here we report on th...
Anurag Ambekar, Charles B. Ward, Jahangir Mohammed...
CHI
2007
ACM
16 years 5 days ago
Expressing emotion in text-based communication
Our ability to express and accurately assess emotional states is central to human life. The present study examines how people express and detect emotions during text-based communi...
Jeffrey T. Hancock, Christopher Landrigan, Courtne...
ICSE
2007
IEEE-ACM
15 years 12 months ago
Randomized Differential Testing as a Prelude to Formal Verification
Most flight software testing at the Jet Propulsion Laboratory relies on the use of hand-produced test scenarios and is executed on systems as similar as possible to actual mission...
Alex Groce, Gerard J. Holzmann, Rajeev Joshi